General

  • Target

    8ef358b7674b5fbb66a70f27f89f59dfc279c658dedba3d97333c2db2d54996d.bin

  • Size

    2.0MB

  • Sample

    240701-1zejeawfln

  • MD5

    afe684098bd0395e8449144caa998aad

  • SHA1

    c361aa3c445b127dead5e9c13191b3a3f7d104c3

  • SHA256

    8ef358b7674b5fbb66a70f27f89f59dfc279c658dedba3d97333c2db2d54996d

  • SHA512

    fae9f3c66efcaef88b4558298bc1b2bad090187dcb3923b99f56e583099d2d597b75804ede9e1b87ff651641d0ffd14a86a8ba738fefd90441cf56af3398a9ef

  • SSDEEP

    49152:JFqw0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYta:B0JNA34NPw4y8nB1gdL

Malware Config

Targets

    • Target

      8ef358b7674b5fbb66a70f27f89f59dfc279c658dedba3d97333c2db2d54996d.bin

    • Size

      2.0MB

    • MD5

      afe684098bd0395e8449144caa998aad

    • SHA1

      c361aa3c445b127dead5e9c13191b3a3f7d104c3

    • SHA256

      8ef358b7674b5fbb66a70f27f89f59dfc279c658dedba3d97333c2db2d54996d

    • SHA512

      fae9f3c66efcaef88b4558298bc1b2bad090187dcb3923b99f56e583099d2d597b75804ede9e1b87ff651641d0ffd14a86a8ba738fefd90441cf56af3398a9ef

    • SSDEEP

      49152:JFqw0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYta:B0JNA34NPw4y8nB1gdL

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks